Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Show Filters
Result Filters:

21 Results Found

Results per page: 10 40 80

Working from home – a hacker’s paradise!

Webinar – Recorded | Oct. 09, 2020

The novel coronavirus has changed many aspects of life for millions of people globally, including where they work. With the increase in remote work, it is important for both individuals and companies to be aware of the added cybersecurity risks. Join us as Paula shares real world examples and tips on how we all can be better prepared.

Windows Server 2008 R2 Training

Video | July 01, 2014

In this video, Practice Leader Craig Brown discusses our exclusive Server 2008 course - Configuring, Managing, and Maintaining Server 2008 R2 (M6419). Specifically, the enhancements we've made to this course through Server 2008 R2 supplemental learning materials and custom hands-on labs that enable the student to utilize critical Server 2008 R2 functions after completing the course.

Why Pentesting is Vital to the Modern DoD Workforce

Webinar – Recorded | Feb. 26, 2019

Watch this recorded webinar as CompTIA’s chief technology evangelist and Global Knowledge’s federal sales director discuss how pentesting has morphed.

Types of Cloud Deployments

White Paper | June 23, 2015

Cloud computing is a big force in IT today, and it isn't going away. In fact, cloud adoption is going up geometrically, both for end users (think apps on your phone or tablet) as well as for organizations of all sizes. In fact, many smaller organizations may not have any on-premises infrastructure at all, other than networking infrastructure to get connected to the cloud. With this transformation in IT, it behooves all of us in the industry to understand it and adapt or risk being out of a job, like punch card operators.

Trends in Cybersecurity

Webinar – Recorded | Feb. 03, 2021

Organizations and individuals are threatened with ever-growing cyber threats and must be prepared to address them. The more we are connected to networks, the more suspectable we are to attacks, therefore enterprises must stay current applying various cybersecurity measures and maintaining awareness of cybersecurity trends. View the slide deck>    

Top Four Considerations When Choosing Your SoftLayer Data Center Location

White Paper | May 07, 2015

A range of factors can influence the data center you choose. You should consider all of the factors listed in this white paper before deciding where to place your servers.

The Importance of Maintaining Cybersecurity Skills in a Virtual World

Webinar – Recorded | Oct. 19, 2020

The Information Technology (IT) profession is a pretty exciting place to be, right now. We’re seeing an unprecedented influx of new technologies and approaches, including AI, robotics, automation, and next-level networking. More importantly, today’s IT workers have become the guardians of identity and curators of information. Given the increased movement to remote working the IT community must be conscious their teams skillset in the midst of increasing and complex cybersecurity threats designed to hit organizations where it hurts...their people. If you’re curious about what it’s like to be part of the IT profession in quickly changing virtual world, then watch CompTIA’s Chief Technology Evangelist, Dr. James Stanger, to learn more. James discusses the pillars of IT that help create our (post)-modern world, and dispel a few myths about the cybersecurity profession. If you’re interested in learning more about the different cybersecurity pathways available to you, and how you can become a unique contributor to the cybersecurity profession, then we welcome you.

Software Problems and How Docker Addresses Them

White Paper | Jan. 12, 2016

Learn how Docker makes it easy to update, test and debug software with this white paper and gain foundational knowledge about Dockerfile, Docker images and containers.

Read-Only Domain Controllers (RODC)

Video | Sep. 02, 2014

In this video, instructor Charles Strother does a quick overview of what is needed to install a Read-Only Domain Controller (RODC) in a Windows Server 2008 environment.

Monitoring and Troubleshooting the Performance of a Windows Server Environment Workshop

Video | May 29, 2014

Global Knowledge Practice Leader, Craig Brown, explains what students will learn in our "Monitoring and Troubleshooting the Performance of a Windows Server Environment" workshop.